tag:blogger.com,1999:blog-13411904Sat, 28 Mar 2015 09:04:54 +0000newsMicrosoftIT SecuritySecurityAppleGoogleiPhoneBusinessspamInternethardwareLinuxTwitterWindowsMalwarecrimesearchPrivacyHackingMobile PhoneemailsexFacebookfunnyhackergovernmentVistadataTechnologyiPhone 3GSoftwareWeb DevelopmentlawSurveyiPodGamesMusicWindows 7pornChinaEnterpriseResearchWeb BrowsermobilePoliticsYouTubebotnetBroadbanddata protectionAdvertisingvideoGamingphishingApp StoreUKopen sourceIBMMacNational Securityhackedsoftware developmentObamaYahoovirusDownloadsEnvironmentFirefoxWebeconomywormCopyrightMozillaTrojanVulnerabilitycensorshipgadgetsLawsuitPresidentdevelopmenthealthmoneyDeathEuropeExploitITPatentsPiracySonyUnited StatesXbox 360social networkingspammerterrorismtransactional securityPS3eBayiTunesreportBlackBerrynetbookDellDeveloperEncryptionGmailJobsNintendoSecond LifeSophoscredit crunchreviewsatnavshoppingBarack ObamaBrowserNHSSymantecscienceIntelTVWeb 2.0attacklegalscamteensAndroidBTElectionMP3OSWikipediacelebritydatabasepornographyBBCCloud ComputingInternet ExplorerMoviesOlympicsSkypefreegamerslaptopssocial networkspammingAmazonBetaBig BrotherGreenKasperskyPasswordsUbuntuVirtual WorldWiFiWiiadultbanbannedcellphonechild pornecommercefinanceiPadpaedophilespolicesmartphonespambotspywareAdobeApplicationsBlogChromeConsoleEUMMORPGMacbookMediaNASAParis HiltonSalesWindows XPXPbankingconfickercredit cardseducationemploymentfraudhumourkidsnakedspeedAvatarBreachBritishDRMGPSGeekGoogle EarthIE8ISPOpinionRIMRussiaStorageWarXboxoddballtestingAcquisitionAsusEnergyFUDFile SharingFlashHoaxLondonMarket ShareMcAfeeNokiaPatchPhormSpaceSteve BallmerSteve JobsTomTomUpdatealiensdangerfailmarketingnetworksrecessionservertextingtravel3GAustraliaBeing VirtualBill GatesBooksChineseFakeGartnerGary McKinnonGoogle NewsHPHomeland SecurityIndiaJapanMadnessMicrosoft Xbox 360MySpaceNortonOfficeP2PPlayStationSMSSafetyStupiditySunSupercomputerTelevisionTrendsUSBantiviruschild protectionmapsmarketsspace travelspyingstatisticstheftxmas3GSAMDAdWareCAPTCHACodeDSDiggFranceGames ConsoleGoogle MapsHarry PotterHotmailIMLawyersLenovoLicensingPalinPlayStation 3SwedenT-MobileThreatUFOWirelessWorld of Warcraftawardscarscybercrimedesigndownloaddumbassfree hardwaremotoringmurdernetworkingoperaoperating systemprisonpublishingrumourvirtual communityvirtualisationAOLApple StoreBeijingBlu-rayBusiness ContinuityConsolesDNSEee PCEntertainmentFBIFootballFreedomGoogle AppsHMRCID CardsIDCInfosecurityKindleLeakMcCainO2OS XObama 08OutsourcingPatch TuesdayPopulationRRoDRecallRed Rings of DeathSEOSQLToshibaTrademarkUSAauctionbirthdayblack hatbloggingbugscomputerscostdrugsfilteringfirewalliTouchiTunes 8militarynetworknudeonlinephotographypowerprintprogrammingrantrecyclingreligionsocial mediaspendingstudytoiletvideo gamesviolencevirtualizationworkingAcerArmyBarackBatteryBeboCampaignChipsetCrackCrackedCrashDesktopEFFF-SecureGTA IVGordon BrownHalo 3Hyper-VICANNID TheftIPIT ProfessionalIdiotInformationJailbreakLinux FoundationMichael JacksonMicrosoft OfficeMobileMeMurdochPCPartyPhotoPlanetRFIDSP1SQL InjectionScarewareStandardsSymantec MessageLabsSymbianTelecomsTescoUS ArmyVMwareVeriSignVoIPVodafoneVoteWindows MobileXbox 720Zero Dayagebillionbiometricschip and pinclonecustomer servicecyber-crimecyber-warfaredata centerdata protection acteconomicsexperimentholidaysidentityknickersparentingpublic transportretailriskschoolstupidsupporttop 10trainsvideogamewarningwebsitewomenworkplaceAIAJAXAdSenseAnalysisAppsArtBingBitTorrentBritainCapacityChinese TakeawayCiscoCoderComputer History MuseumConsumerCrackBerryCuilDDoSDana CentreDaniWebDebateDisplayEULAFilmFirmwareHPCHTCHaloHistoryHotHouse of LordsICOIPv6IT AdminJK RowlingJavaJohnny DeppJokeJustin BieberLCDLinkedInListLotusMappingMonkey DanceNVIDIANanoNorton 2009Norton Internet SecurityPS4PWN2OWNParanoidPenguinPentagonPirate BayPredictionsPrivacy InternationalPublic SectorPwnagePwnedRed HatRedditRemote WorkingResearch In MotionScience MuseumSoccerStar TrekStephen FryStormStreaming VideoStreet ViewTakeoverTaxThe Pirate BayTimeTorrentTweetValueViacomVirginVirtual WorldsVoiceWebmailWoWWorld CupXMLZuckerbergbeerbiologybizarreblackmailbracancercell processorchipchristmascloningcompetitiondata centredata retentiondisclosuredrivingenabling technologyeventextraditionfailurefamilyfuelgoldgold farminggraphicshackershotelhypervisoriPhone 2.1iPhone 3.0iPlayeriTunes Storejournalismlabslovemedicinemost spammednews.notebookoldorganised crimepandapaperparliamentpaymentpolicyrobotsscotlandscumsicksizesnooperssolarstrategytelephonyterrortrafficvendorweirdwifezombie12 incher20073DAPACSASAASP.NETATMAcrobatAdwordsAmericaAppealApricotApril FoolAtomAudioBPIBabbageBabyBatmanBlack HoleBling BlingBlizzardBloggerBluetoothBook LaunchBoris JohnsonBrandingBritneyBroadcastBudgetBuggyBungieCEOCEOPCESCIACarriersCheckPointClintonCode BreakerCodingComedyComputer WeeklyConservativeCryptographyCutsDLCDMCADanceDancing BabyDebianDefconDevelopersDieselDomain NamesDownload FreeEarth HourExamF1FASTFOSSFestivalFightFireFortinetFujitsuG1GNOMEGermanyGodGoogle ChromeGoogle Street ViewGrand Theft AutoGreen ITGuardianGumblarHDHD-DVDHDTVHTMLHTML 5HashtagHateHeart AttackHotSpotHypeIP theftISFISSInfectionInfosecInstant MessagingInternet2ItalyJasperJavaScriptJohn McCainKill switchKnolLHCLarge Hadron ColliderLeopardLily AllenLipstick on a pigLivelyLonghornMI5MSNMW2Madeleine McCannMagicMarsMcDonald'sMinistry of DefenceModern WarfareMojaveMonsterNazisNetscapeNew YearNew YorkNews InternationalNexusNumber OneOLPCOfcomOilOneCareOrangeOverheatingPC ToolsPDFPakistanPalmPantsPassportPaywallPetrolPhoenix LanderPortalPresidentialPricingProductivityPsionPsystarPwnageToolRIPRSARacingRadioRadioheadReaderRockRoyal NavyRoyaltiesSDKSQL Server 2008SSDSSLSarah PalinServicesSexySilverlightSitcomSkySkymarketSmellSouth LondonSpongebobStrangeStumbleUponSuSeSuicideSupermarketTeenagerTexasThe BeatlesThe Lost and DamnedThinkpadThunderbirdTorvaldsTreeTuxUGCUMPCUS GovernmentUWBUnited KingdomUniversityUpgradeVPNVacationViaViralW3CWMAWPAWWWWalmartWindows VistaXSSXbox LiveYoggieZoneAlarmaddictionarrestautosbackupblindblockedbullyingcambridgecashcharitychavcheatclientcold warcomScoreconnectivityconsumerismcrisisdaftdisabilitydistrodotcomdumbe-booke-crimeepilepsyexposedfanboyfartfibre opticgeekinigeeksgirlhome workinghow toiPhone 4iPhone 4GiPhone Dev Teamillinnovationinvestigationjailjargonknifelanguagelaughliarlibellink clicking idiotslotteryluxurymeasurementmentalmicrochipmobile broadbandmonitoringmonkeysmuppetsmuseumnanotechnologyonline gameonline worldovumparentspedophilephysicspress releaseprince charlesprince of walesprinterprintingprostitutequeenrecordrelationshipsreliabilityreportingroyal familyroyaltysaleschoolssemantic searchsharessocial newsspear phishingstabbedstaffstanfordstolenstresssuckssurvey newsswindontech supportteenage girlsteleworkingtop 500trustundergrounduniverseusabilityuser feedbackutilityvampiresviagravibratingvisawastersworkforce.com0071112 inches151819801Gbit2006201020123.0419508250AACSACDCAIMAPIASPAT and TATIAUPAVGAction PackActivationAd-BlockingAdvance WarsAdvisoryAfghanistanAfricaAl-QaedaAlan TuringAlaskaAliveAll of MP3AlphaAmy WinehouseAncient RomeAnorexiaAntikythera MechanismArcadeArchitectureArctic MonkeysArsenalArtificial IntelligenceAsiaAspergersAssAstronautAtlantisAudio DescriptionBOFHBSGBSIBSODBandwidthBanksyBarcelonaBatDogBatteriesBearsBelgiumBenchmarksBest PractiseBest WesternBetBicycleBidBidenBigBigfootBiofuelBirminghamBizTubeBlabyBlack HawkBlackHatBlame GameBletchley ParkBlinkxBlue Screen of DeathBluffBobBob MonkhouseBoldBoot CampBoratBorkBotBotanyBrabenBransonBreastsBrickBritsBrokenBuddhistBushBusiness ProcessBuzzC4C5CAN-SPAMCCTVCERNCGICGSCIXCPUCSOCanadaCareersCartelCarter RuckCartoonCash machineCentrinoCentroChairChangeBASEChannelChannel 4ChatCheapCheap PerfumeChelseaChryslerCitrixClimateCloudPrintClubbingCluleyCoPilotCode breakers CodeCold StorageColossusComic ReliefComputer ScienceConfessionCongressConroyConsentConspiracyContractsControllerCopenhagenCorporateCosmic OrderingCosmosCountingCraigslistCrapCrazyCult of the Dead CowCultureCurveCut and PasteCyber-BullyD-LinkDHLDLPDTVDaisyDalai LamaDamien HirstDan BrownDarknetDavid BlunkettDeadDealsDeathly HallowsDefenderDemocratDemonDenial of ServiceDeutsche TelekonDev TeamDietDiggBarDigital BritainDigital Economy BillDigital TVDo No EvilDoomDowntimeDrinkDroidDual-BootEAEDGEELSPAEMEAESXiEarthEarthquakeEastern EuropeEating DisordersEee BoxEightiesEinsteinEinstein's TelescopeElcomSoftElephantEliteEllisonEmbeddedEmma WatsonEncyclopaediaEncyclopediaEthelEthernetEuro 2008EveshamEvilExcelExcuseExpansysFACTFCOFONFTCFTPFTTCFacebook The MovieFacepartyFair Usage PolicyFake Steve JobsFarceFascistFast FlipFedoraFennecFetusFiasco AwardFijiFinjanFinlandFire BrigadeFireworksFlashmobFlickrFlightFlip PhoneFloodingFoetusFollowersFoodForeign OfficeFormsFormula OneForresterFoursquareFrance TelecomFrenchFriendsFrozenFutureG20GPLGSMGTAGagGame BoyGarth BrooksGatewayGeek TestGeniusGeorge BushGeorgiaGigabitGimmivGizmodoGlastonburyGlobal WarmingGoatseGoodbyeGoogle BooksGoogle DocsGoogle LivelyGoogle OceanGoogle TrendsGoogle Video for businessGoogle minus GoogleGooglebombGooglebotGowers ReviewGrasshopperGreenpeaceGuantanamo BayGuidelinesGuy KewneyGypsyHD2HSBCHacked newsHaitiHandShoeMouseHandsetsHermione GrangerHeuristicHijackHiltonHitachiHitlerHoffHomer SimpsonHospitalHostHotel EvolutionHotfixHouse of CommonsHoustonHullHyperVMHypponenIE9IEEEILCIMAPIPOIPv4ISPAIT CrowdIT SpendingIT staffITUIWFIcahnIg NobelIllnessInaugurationInfinity WardInfluenzaInformation ManagementInfringementInsightInstant OnIntellectual PropertyInterfaceInternational Linear ColliderInternetpolInterviewInventorIoloIranIraqIronPortIslamItaly SwedenIvoryIvy BeanJabberJack StrawJacqui SmithJames BondJerry YangJesusJesus PhoneJudgeJumPCKDEKITTKafkaKarooKateModernKazakhstanKevin RoseKeyboardKid RockKillKillswitchKinKitsoundKnight RiderKnowledgeKoobfaceKrakenLA TimesLEGOLGLSELabourLady GagaLamerLara CroftLas VegasLatitudeLazyLearningLegendLets RockLettersLexiconLexusLiabilityLightbulbLimbo 2LimitNoneLinden LabLinux MagazineLinux ProLiveLive InsectsLiverpoolLonelygirl15Longhorn ReloadedLudditesMCPMDAMI6MITMMOGliderMOOFMPAAMS OfficeMSNBCMTVMXP4MacBook ProMadonnaMadridMafiaMahaloMalariaManchester UnitedMarketing NumptyMatroxMayorMega-DMemoryMemory lossMessagingMessed UpMexicoMichael MooreMichiganMicrosftMicrosoft Vista BlogMicrosoft WorksMikeyyMind LabMobile World CongressMoboMonty PythonMoonfruitMoore's LawMosquitoesMotorolaMotorsportMud PieMuseum of ComputingMySQLMythNANDNB100NBCNESNHTCUNIS 2009NIS2009NapsterNatureNeosploitNerdNetwork SolutionsNeural NetworkingNew SpeciesNightclubNingNo ParkingNochexNoel EdmondsNoro VirusNorwayNotesNuclearNumbersNumptyNutterOAPOCROEMOSSOffice 14Office AssistantOfflineOld DuffersOnionOnline mappingOpteronOracleOrcOrkutOscarsOutlookOysterPAYGPBXPC MagazinePC ProPC WorldPDAPDCPGPPINPRSPSPPacketExchangePandaLabsPanicPaperclipParticle PhysicsPayPalPearlPenelopePersonalPerthPhoto MessagingPicasaPineAppPiratesPitcairn IslandsPlam PrePlease Rob MePocketPodcastPokemonPongPoolPoopPopePostiniPrankPrePrice FixingPrinceProblemsProduct ActivationPropellerProtestPublicityPublsihingPunkPush NotificationPwned PwnagePythonQUAEROQuadQuakeQuantumQuantum PhsyicsRAFRAIDRAMRCRIPARISCRMRNSROFLROLFRSIRTMRacismRageRage Against The MachineRashReadingRealPlayerReality TVRecruitmentRegistry Cleaner XPRepairRepublicanResellerResultsRichRichard BransonRicky GervaisRoadRunnerRoadmapRobbersRobotsRoguewareRole-PlayingRolexRolf HarrisRomaRomaniaRomanian National SecurityRonnie WoodRubyRulingRustockRyanairSANSSERPsSETISIPSOCASPOTSafariSafer Internet DaySalvoSamsungSarkozySchwarzeneggerScience FictionScrabbleScriptSeaMonkeySeadragonSearchMonkeySearchwikiSecret SquirrelSeinfeldSex ToysSharePointSharpSheriffShiretokoShopzillaShuffleSidewinderSilicon ValleySillySilver SurferSiteAdvisorSkype 4.0Slacker UprisingSlagSmartcardSnoopingSofwtareSony PlayStation PS3 Xbox 360 Games ConsoleSophie MonkSouth ParkSpace InvadersSpamhausSpeakerSpinSpoofSportSpotifySrizbiStabilityStalkDailyStandardStar WarsStealingStephen HawkingSteve MolyneuxStimulus PackStockStoreStorefrontStorm 2Suicide HackSunday TimesSuperheroSwearSwedishSwimmingSystem MechanicSzrizbiTPITRACETaggedTaitoTalkTalkTapeTax OfficeTaxiTerabyteTetrisTexas InstrumentsThe ForceThe Lost SymbolThe OfficeThe SimpsonsThe StigThe SunThe TelegraphThe TimesThe West WingTheme ParkThereminThiefThreeThrillerTiger WoodsTime TravelTinyTipsTokyoTomTom for iPhoneTomb RaiderToolbarTop 20Top 3Top 5Top GearTorToryTottenhamTouchToyotaTrading StandardsTrafiguraTransvestiteTrekkiesTrend MicroTrousersTubeTumbleweedTunisiaTurkeyTwitTwittexTyanU-TurnUACUMGUNIXUSPTOUclueUltrapediaUnified Computing SystemUniversalUnlimited UseUranusUsenetUsersUtahVAServVAserv WebsitesVB100VMVRValhallaVaticanVauxhallVegVegasViennaVietnamVirtual RealityVirtvirtualisationWGAWTFWW2WWIIWakoopaWaledacWall StreetWankersWarrantyWashingtonWeaponsWidgetsWikiWilliamsWinHECWindows 7 StarterWindows Mobile 7Windows Phone 7 SeriesWiredWizardWolfram AlphaWooshWorksWorld ChampionWorld War IIIX-ForceX-Ray SpecsX-ratedXP ModeYandexYellow DogYodaYouGovYukonZDNetZangoZeitgeistZimmerZuneadmininstratoraffairagingair forceairlinesairportalgorithmalzheimersangeranonymityantispamantsassessmentasset taggingauthenticationauthorsautomobileaxebacklashbailoutbananasbarristerbedbehaviourbettingbig bangbikinibingobitch slappingblackblacklistblackoutboffinsbombboomborn-againbouncebubblebudgetscablecalculatorcall costscarbon copycatscease and desistchaoschargerchatroomschatting upchickenchoicecitizenclasscleanercleaverclockcloudmarkcoal minerscode injectioncomcommon coldcommunicationcompromisecomputer repaircomputingcondomsconsumer electronicscontentcontestcontrolcottagecoughingcounterfeitcoursecuomocupcakecurrencycystic fibrosisdeafdeafblinddebtdeep webdefaceddegreedeliciousdemocracydesignerdestroydiallerdickdigital dividedigitisationdinosaurdirectionsdiscodiscomgoogolationdiscussiondiseasedistributiondivorcedocumentdomaindonutdownadupdumpede-golde-ticketingeCrimeearningsecologyeggelderlyelectricityend of the worldendangerederoticerrorespionageethicsewsexplicitfacial recognitionfactsfalse positivefamefantasyfeckerfelonfile formatfinefingerprintsfiscalfleetflip flopsflirtingfloatflyingfoldingfoolforeignfree-rangefrisbeegTunesgamblegamblinggasgendergiftgirls gamesglassgraffitigreedgridgriefinggroomingguitar herogunhalibuthalloweenhappy slappingheadhearthigh heelshonestyhorrorhuman hackinghumorhurtiGoogleiOS 4iPhone GirliPhone OS 4iPhone2id Softwareidiotsimagesinboxindexindictmentinfrastructureinjuryinkjetinsaneinventioninvestmentixquickjournalistjusticekeywordskidnapkidokittenslaserlaunchlegislationlegslibrarylightestlingerielostlost propertyloudestlovermagazinesman in the middlemanagermanhuntmarriagemashedmashupmathmemedia playermeltdownmergermetricmiddle-agedmilitary Intelligencemillionmimecastmind mappingmindsetminersmis-managementmissingmission impossiblemoronmousemysterynabaztagnavalnavigationnewspapernightmaresnonsensenovelnull pointernutsolderoldestopinionmopticaloutageoxpanasonicpantiespartially sightedpayment serverspensionersperformance-per-wattperipheralspersonalitypervertpharmacypharmingpick up linespimppokepollpowerboatsprivate eyeprobeprofitprojectpromotionproxypsychicpublic keypump and dumppushdopvrquitrabbitrailwayratesrecordingreferencerefundregulationreleaserentalreplicaretaliationrevengerevenuesreverse engineeringrootkitrouterruralsabbathsalariessalarysalesforce.comsamhainsandisksat nagsatlavscansafescarescreensseasonalsecuniasecurity guardseizuresself-destructsemantic webseniorssewersextingsexualsexual abuseshamesharingshockingshoesshowcasesickeningsicknesssidekicksiliconsimulationskimmingslapsleepingsmear campaignsmokingsneezingsoapsoundsouth koreaspiesstilettostingstinkysub-netbooksuingsurfingswiss armytaggingtargettarifftattootaxesteddy bearsteraFLOPSthinkuknowthinnesttickettop 100topologytoriestrackingtradetranslatetrialtrilliontruthuSocialunderwearusageuselessuser generated contentvBulletinvaginavalentinevandalismvice-presidentvillainvirtual machinewagerwageswalletwant itwet pantswhoreswikileakswildlifewomanwriteyoungestyoungstersFreelance Word Punk[Wavey Davey and dwindera are long since dead, but Davey Winder lives on as 'happygeek' a.k.a the Freelance Word Punk. Welcome to my annoyingly interesting, or should that be interestingly annoying, IT security related ramblings]http://happygeeknewmedia.blogspot.com/noreply@blogger.com (Davey Winder)Blogger2574125tag:blogger.com,1999:blog-13411904.post-4650591371772254910Sat, 28 Mar 2015 09:04:00 +00002015-03-28T09:04:54.066+00:00Don't click on this link: How to avoid the cloud credential scammersWhen we think of cloud security, more often than not it is in terms of protecting our data in transit and at rest. However, sometimes it helps to broaden our view of the cloud security threatscape because when we do then all sorts of risks sitting on the periphery come into view. Risks such as those posed by cloud credential phishers. Cloud what now? Well, everyone should be well aware of those http://happygeeknewmedia.blogspot.com/2015/03/dont-click-on-this-link-how-to-avoid.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-8285876617686219113Fri, 27 Mar 2015 08:52:00 +00002015-03-27T08:52:06.332+00:00Will Windows Server become a zombie OS?Which 12 year old operating system which is still running on 11 million servers is about to die? Yep, that's the one: Microsoft Windows Server 2003 reaches 'end of life' status on July 14th. One of the longest running discussions on DaniWeb asks the question Why does Windows XP refuse to die? and I have my suspicions that we may be asking the same of Windows Server 2003 in the years to come. http://happygeeknewmedia.blogspot.com/2015/03/will-windows-server-become-zombie-os.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-5687142375182770939Thu, 26 Mar 2015 18:31:00 +00002015-03-26T18:31:48.984+00:00Tor-fuelled Trojan gets stealthy with steganographySenior AVG developer Jakub Kroustek found that this constantly evolving piece of financial malware that uses fairly typical API hooking and injection techniques to steal login credentials, financial data, private keys and ultimately execute transactions from compromised accounts is anything but typical upon closer examination. In a white paper which goes into some depth regarding the technologieshttp://happygeeknewmedia.blogspot.com/2015/03/tor-fuelled-trojan-gets-stealthy-with.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-2000113488704714138Thu, 26 Mar 2015 12:03:00 +00002015-03-26T12:10:18.022+00:00Vulnerability report reveals Microsoft isn't the bad guy after allIt's that time of year again, and the latest Secunia Vulnerability Review has been published. This analysed anonymous data gathered from scans right across 2014 of millions of computers which have Secunia Personal Software Inspector (PSI) installed and revealed some interesting statistics. On average, the computers used by the people running PSI had 76 programs installed on them and these vary http://happygeeknewmedia.blogspot.com/2015/03/vulnerability-report-reveals-microsoft.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-987188861071697398Sun, 22 Mar 2015 10:42:00 +00002015-03-22T10:42:35.079+00:00Facebook bug let third party apps peek at your private smartphone photosThe recently revised Facebook community standards page states that the social network is on a mission "to give people the power to share and make the world more open" however it appears that it may have been giving the wrong people the power to share stuff you thought was private. According to security researcher and bug bounty hunter Laxman Muthiyah Facebook's photo sync feature came with a http://happygeeknewmedia.blogspot.com/2015/03/facebook-bug-let-third-party-apps-peek.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-7583912517789245144Thu, 19 Mar 2015 11:22:00 +00002015-03-19T11:22:35.898+00:00Could a heart attack lock down your bank account in Halifax?Halifax is the town in West Yorkshire where I live, and it also happens to be the name of a well known UK Bank which started life there. Best known on the this side of the pond for TV adverts featuring a friendly chap called Howard Brown, a former customer services representative and sales ambassador for HBOS which owns the Halifax. If recent reports are correct, then before long the Halifax http://happygeeknewmedia.blogspot.com/2015/03/could-heart-attack-lock-down-your-bank.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-7088242559258658775Wed, 18 Mar 2015 05:25:00 +00002015-03-18T05:25:11.122+00:00Dirty Facebook worm cuts itself in half to evade detectionFacebook distributing malware is nothing new, nor are shortened URLs for obfuscation, in-the-cloud servers for anonymity or porn as a lure. However the latest Kilim-family variant which hit Facebook last week uses all of them and with a twist: this worm keeps cutting itself in half to evade detection. Jerome Segura, security researcher at Malwarebytes, spotted the worm using Facebook with a lure http://happygeeknewmedia.blogspot.com/2015/03/dirty-facebook-worm-cuts-itself-in-half.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-6575027602763873108Tue, 17 Mar 2015 09:35:00 +00002015-03-17T09:35:01.250+00:00PayPal buys into bio-inspired security with CyActiveI don't usually write about acquisitions and all that financial stuff, but news that PayPal has acquired CyActive caught my eye as apparently this brings the promise of 'bio-inspired predictive security' into the online payments provider threat protection mix. Which made me think, just what the heck is bio-inspired predictive security when it's at home, and why has PayPal bought into it? My firsthttp://happygeeknewmedia.blogspot.com/2015/03/paypal-buys-into-bio-inspired-security.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-7354520830137082634Thu, 12 Mar 2015 06:40:00 +00002015-03-12T06:40:37.437+00:005 ways to stop your business from being hackedOnline business owners need to take hacking attacks very seriously indeed, no matter what guise they come in. Data breaches, Denial of Service attacks or compromised sites being used to distribute malware will all have an impact on your business; and that includes the small business sector. In fact, small businesses are likely to suffer greater consequences as a result of of being hacked than thehttp://happygeeknewmedia.blogspot.com/2015/03/5-ways-to-stop-your-business-from-being.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-7940906101632645800Wed, 11 Mar 2015 10:15:00 +00002015-03-11T10:15:10.757+00:00Uneducated WordPress users are pressing the self-destruct buttonContent Management Systems (CMS) may not be the most interesting topic on the tech table, but oh boy does WordPress liven things up in this sector. Not, it has to be said, always in a good way. I've lost count of the number of WordPress vulnerability stories that I've read over this last 12 months, and have even written a few myself. of course, more often than not it isn't WordPress itself that http://happygeeknewmedia.blogspot.com/2015/03/uneducated-wordpress-users-are-pressing.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-1133806470060929619Wed, 11 Mar 2015 08:36:00 +00002015-03-11T08:36:57.799+00:00How to overcome the Cloud DDoS awareness issueRecent research has revealed what most people working in the IT security sector already know: that Distributed Denial of Service (DDoS) attacks have become commonplace. However, there's something of a disconnect between acknowledging the risk and actually doing anything to mitigate it. One such survey by DDoS mitigation outfit Black Lotus showed that PaaS providers (with 64 per cent being http://happygeeknewmedia.blogspot.com/2015/03/how-to-overcome-cloud-ddos-awareness.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-6929955239473406785Wed, 11 Mar 2015 08:11:00 +00002015-03-11T08:11:20.572+00:00Don't FREAK out over the Factoring Attack on RSA-EXPORT KeysIt's about time we got things, by which I mean security vulnerabilities, into freakin' perspective. Currently the IT security industry and the media covering it are, in my opinion, in danger of becoming the internet equivalent of Chicken Little. Every time a vulnerability is discovered which has the potential to impact upon large numbers of users we get the same 'the sky is falling' message writ http://happygeeknewmedia.blogspot.com/2015/03/dont-freak-out-over-factoring-attack-on.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-525832143271462403Mon, 09 Mar 2015 10:54:00 +00002015-03-09T10:54:22.438+00:00Security flaws create Indian Spring for Apache usersSpring has been getting rather unseasonably hot for Apache users as far as security flaws go. First there was news of how the FREAK (Factoring Attack on RSA-EXPORT Keys) vulnerability could impact Apache. For more on FREAK see this excellent analysis by Matthew Green, a cryptographer and research professor at Johns Hopkins University. Green points out that "Apache mod_ssl by default will generatehttp://happygeeknewmedia.blogspot.com/2015/03/security-flaws-create-indian-spring-for.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-5813772538243078507Fri, 06 Mar 2015 08:50:00 +00002015-03-06T08:50:57.313+00:00The WordPress CMS isn't insecure – you are!The latest in a long line of headlines has highlighted yet another WordPress flaw – this time a million sites have been put at risk by a vulnerability introduced by another poorly coded plugin, with an analytics tool using a stupidly guessable secret key. As a result, warnings have been flying around about how insecure WordPress is and how it's time to get real and move into a more secure Contenthttp://happygeeknewmedia.blogspot.com/2015/03/the-wordpress-cms-isnt-insecure-you-are.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-3251822769274946634Tue, 03 Mar 2015 09:47:00 +00002015-03-03T09:47:18.145+00:00Blu-ray hacking exposedAddressing last weeks Securi-Tay conference hosted by the Abertay Ethical Hacking Society in Scotland, Stephen Tomkinson from the NCC Group detailed how Blu-ray players can do more than play videos; they can open up a new attack surface for the hacker. Tomkinson demonstrated a new tool that had been released in order to enable the investigation of embedded network devices, and used the network http://happygeeknewmedia.blogspot.com/2015/03/blu-ray-hacking-exposed.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-96955010443494320Sat, 28 Feb 2015 09:39:00 +00002015-02-28T09:39:27.315+00:00The cloud security conundrum: de-perimeterisation or re-perimeterisation?The cloud is, perhaps, the epitome of de-perimeterisation. If you take the definition of this being the removal of boundaries between the enterprise and the outside world it's pretty much bang on the money. It's easy to assume, therefore, that de-perimeterisation in the information security sense is the answer to your cloud security concerns. It isn't, at least not the complete answer. For the http://happygeeknewmedia.blogspot.com/2015/02/the-cloud-security-conundrum-de.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-5372416952510011604Sat, 28 Feb 2015 09:38:00 +00002015-02-28T09:38:51.241+00:00How to convince your CEO that the cloud is secureConvincing senior management that the cloud brings functional and financial benefit to the business is not a hard sell. The same, sadly, cannot be said when it comes to the security argument. With so many media headlines painting the cloud as an insecure place for your data to reside, most often erroneously courtesy of a misunderstanding of the nature of the breaches involved, it's perhaps not http://happygeeknewmedia.blogspot.com/2015/02/how-to-convince-your-ceo-that-cloud-is.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-2484359460839082187Sat, 28 Feb 2015 09:38:00 +00002015-02-28T09:38:03.687+00:00Three simple ways to mitigate risk in the cloudResearch recently published by Netskope suggests that 15 per cent of business users have suffered a compromise of sensitive data in the cloud, with half of those asked apparently ignoring such simple security basics such as not reusing passwords across services and applications. I've already addressed one of the specific concerns was flagged by the research, that 88 per cent of cloud applicationshttp://happygeeknewmedia.blogspot.com/2015/02/three-simple-ways-to-mitigate-risk-in.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-2116552243536702032Sat, 28 Feb 2015 09:36:00 +00002015-02-28T09:36:59.587+00:00How to secure the Cloud of EverythingSpeaking at CES, the chair of the US Federal Trade Commission warned that the Internet of Things posed a serious risk to the privacy of consumers. The speech by Edith Ramirez may have been talking about connected devices and consumers, but the same issues apply to the corporate 'Cloud of Everything.' She spoke of the dangers of ubiquitous data collection, unexpected uses of that data and http://happygeeknewmedia.blogspot.com/2015/02/how-to-secure-cloud-of-everything.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-2906831719945927375Fri, 27 Feb 2015 12:37:00 +00002015-02-27T12:37:33.641+00:00When Google Maps Attack!Akamai is reporting that the reflection attack method has been used in conjunction with Joomla servers running a vulnerable Google Maps plugin. Akamai warns that, after a whole bunch of vulnerability disclosure across 2014, the Joomla content management framework is still being actively targeted by those with malicious intent. In conjunction with the PhishLabs Research, Analysis, and Intelligencehttp://happygeeknewmedia.blogspot.com/2015/02/when-google-maps-attack.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-2097197749510235321Fri, 20 Feb 2015 08:15:00 +00002015-02-20T08:15:37.471+00:00How to check for and securely remove Superfish badware from your Lenovo PCChinese computer manufacturer Lenovo has admitted that it installed an adware component called Superfish on 16 million PCs shipped between September 2014 and February 2015 in order to "help customers potentially discover interesting products while shopping" according to an official statement made by the company. Although there is some argument to be had as to the validity of the 'helping http://happygeeknewmedia.blogspot.com/2015/02/how-to-check-for-and-securely-remove.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-2935239683701436228Mon, 16 Feb 2015 07:17:00 +00002015-02-16T07:17:27.017+00:00How does malware detection work in the cloud?Cloud-based security is nothing new. In fact, Security-as-a-Service has become both the norm for vendors within the IT security market and an indicator of how far the cloud has evolved when it comes to being a trusted place to do business. If we accept that the cloud has forced a welcome change upon the IT security delivery landscape, so we must equally accept that the bad guys are also taking http://happygeeknewmedia.blogspot.com/2015/02/how-does-malware-detection-work-in-cloud.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-1775912994684916581Sun, 15 Feb 2015 10:56:00 +00002015-02-15T10:56:10.829+00:00Don't want your Samsung TV to collect data, then don't be a lazy jackassI take security and privacy issues seriously, but sometimes I despair when news stories such as that regarding Samsung TVs eavesdropping on private conversation explode across the media as happened last week. The reason for my despondency has less to do with the data privacy debate and more to do with the human stupidity one. That said, let's get the technical bit out of the way first. The http://happygeeknewmedia.blogspot.com/2015/02/dont-want-your-samsung-tv-to-collect.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-3911715052203738663Tue, 10 Feb 2015 06:40:00 +00002015-02-10T06:40:09.450+00:00Anthem data breach: Why the data-centric security message needs resuscitatingThe second largest health insurer in the United States, Anthem, has fallen victim to a massive data breach, details of which emerged last week. It is thought that as many as 80 million user records were accessed during the security breach, and the source is said to be an 'acquired' employee password, if the security grapevine is to be believed. If that weren't bad enough, the leaked data - which http://happygeeknewmedia.blogspot.com/2015/02/anthem-data-breach-why-data-centric.htmlnoreply@blogger.com (Davey Winder)tag:blogger.com,1999:blog-13411904.post-6707456539600470536Mon, 09 Feb 2015 08:38:00 +00002015-02-09T08:38:31.290+00:00Islamic State down: Anonymous drops social media bomb on ISISThe hacker collective known as Anonymous first declared war on Islamic State (formerly known as ISIS) supporters back in the Summer of 2014 with Operation NO2ISIS which promised to target the online infrastructure of those countries sponsoring Islamic State militants. This declaration followed the hacking of an Anonymous Twitter account, @TheAnonMessage, which was then used to post photos of a http://happygeeknewmedia.blogspot.com/2015/02/islamic-state-down-anonymous-drops.htmlnoreply@blogger.com (Davey Winder)